Final Exam: DevOps Engineer

DevOps    |    Intermediate
  • 1 video | 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 9 users Rating 4.3 of 9 users (9)
Final Exam: DevOps Engineer will test your knowledge and application of the topics presented throughout the DevOps Engineer track of the Skillsoft Aspire Enterprise Developer to DevOps Engineer Journey.


  • Recognize the challenges in provisioning right levels of operational maturity and the key factors to evolve provisioning practices that need to be integrated into devops workflow
    recall the key products and services of docker enterprise edition and along with their associated features
    install and configure openshift container platform to manage it infrastructure and evaluate its enterprise applicability
    recognize the essential features of application lifecycle management with focus on the various phases of application lifecycle management
    list the prominent tools that we can use to implement feedback loops, enable continuous monitoring and help teams to track and respond
    list various types of monitors that we can use to implement feedback loops and create action plans to maintain system robustness
    compare devops and devsecops and describe the benefits of adopting the devsecops paradigm
    recognize the essential devops metrics that we can use to evaluate successful implementation of devops practices
    list the various different approaches of building architecture to setup devops pipelines at scale
    identify the various types of application whitelisting and the steps involved in planning and implementing whitelisting
    list the various different approaches of building architecture to setup devops pipelines
    recognize the steps involved in implementing mature a devops security model that can help assess risks and facilitate continuous security
    define the concept of devops feedback loop and identify the maturity model curve to build well-defined feedback mechanisms in devops lifecycle
    recall the tools and processes that can be used to apply security for devops-compliant processes in order to manage intrusion and incident responses
    use git-secret to manage secure commits in the repository
    list the key features and factors that we need to consider when adopting devops in scaling environments
    integrate issue tracking tools with datadog to create issues from triggered alerts in datadog
    list the essential elements of feedback loop and compare positive and negative feedback loops with the use of real-time examples or use cases
    recall the approaches of implementing devops that adheres to all essential principles and patterns of devops
    create and share custom dashboards, build charts, query data and explore data using the new relic logs ui
    recognize the role of security in devops when building and developing the devops workflow to implement ci/cd processes
    use new relic to retrieve monitoring data from aws accounts securely
    list the categories of tools provided by owasp to secure applications
    describe the implementation of continuous security in devops pipelines, with a focus on test-driven development, monitoring, responding to attacks, assessing risks, and maturing security
    recognize the standard approach of setting up teams to manage projects at scale with a focus on adopting agile and devops standards
    set up and configure hosted docker enterprise
    install grafana and add cloudwatch as a data source to build dashboards for cloudwatch metrics
    define alert policies for incident management using new relic
    recognize the benefits of audit logs along with various log levels that we can configure using docker enterprise to capture security-relevant activities
    list the features of relic apm that provide better end-to-end visibility of applications
  • describe devsecops tools that are used by development teams to integrate security throughout the devops pipeline
    recall the prominent tools that we can use to log, monitor and configure alerts to watch scaling devops architectures
    use new relic to retrieve monitoring data from aws accounts
    describe policy requirements and the guidelines that set the implementation standard for the security requirements specified in the baseline it security policy
    list the essential phases of the devsecops workflow and describe the critical checklists that can help secure devops implementations
    recognize the best practices that we need to adopt while creating and implementing feedback loops in devops with the objective of continuous improvement
    define the concept of infrastructure as code and list the prominent tools we can use to implement infrastructure as code applying best principles to manage provisioning of infrastructure for scaling devops
    backup and restore the configuration to manage docker enterprise and work with telemetry plugin in docker enterprise
    list the general guidelines and recommendations for implementing containerization
    recall the primary goals of adopting devops practices in the enterprise along with its impact on people, process and product
    list the prominent devops tools that we can use to build devops pipelines to manage infrastructure at scale with focus on devops automation
    recognize the need for applying test-driven security on applications, infrastructure, and automated devops pipelines
    demonstrate the various approach of using ucp logs in docker enterprise
    recognize the tools provided by grafana labs to query, visualize, alert on and understand metrics
    recognize the potential challenges in implementing scaling devops architectures and illustrate the impact of devops adoption on businesses
    setup new relic and explore the capabilities of new relic using the new relic dashboard
    recall the critical complexities that can impact enterprise systems along with the role of devops in eliminating and building a stable system
    describe how security and testing can be integrated into a devsecops environment without compromising speed, security, or quality
    build, deploy and scale a multi-os application to docker enterprise using swarm
    recall the phases of devops lifecycle and illustrate the benefit of implementing feedback loops in each phase of the devops lifecycle
    define the roadmap for building modern applications and illustrate the steps and benefits of implementing containerization using docker
    use pentesttool to conduct penetration testing on deployed application to identify vulnerabilities
    recognize the prominent tools that we can use for feedback monitoring and building alerts to implement continuous feedback loops in devops lifecycle
    manage docker images locally and remotely on container registry
    set up continuous build and continuous integration to manage devops architecture at scale
    work with datadog and set up agents to collect metrics and events from the systems and applications
    use new relic to securely retrieve monitoring data from aws accounts
    install and configure trac to build a wiki and issue tracking system for software development projects
    use sentry to monitor errors and help all software teams discover and prioritize errors real-time
    recall the approach of securing docker enterprise and list the security best practices that we need to adopt to eliminate risks


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.5 of 27 users Rating 4.5 of 27 users (27)
Rating 4.6 of 52 users Rating 4.6 of 52 users (52)


Rating 4.3 of 2167 users Rating 4.3 of 2167 users (2167)
Rating 4.1 of 16 users Rating 4.1 of 16 users (16)
Rating 4.4 of 207 users Rating 4.4 of 207 users (207)